Follow
Ping Chen
Ping Chen
Verified email at ist.psu.edu - Homepage
Title
Cited by
Year
HARM: Hardware-assisted continuous re-randomization for microcontrollers
J Shi, L Guan, W Li, D Zhang, P Chen, N Zhang
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 520-536, 2022
122022
Method to input content in a structured manner with real-time assistance and validation
K Chen, P Chen, MJ Dutch, B Chen, CH Claudatos, F Shao
US Patent 11,288,449, 2022
12022
Semantics-preserving reinforcement learning attack against graph neural networks for malware detection
L Zhang, P Liu, YH Choi, P Chen
IEEE Transactions on Dependable and Secure Computing 20 (2), 1390-1402, 2022
382022
A co-design adaptive defense scheme with bounded security damages against heartbleed-like attacks
Z Hu, P Chen, M Zhu, P Liu
IEEE Transactions on Information Forensics and Security 16, 4691-4704, 2021
42021
On convergence rates of game theoretic reinforcement learning algorithms
Z Hu, M Zhu, P Chen, P Liu
Automatica 104, 90-101, 2019
102019
Measuring performance of storage system
Z Yang, C Fan, P Chen, X Chen, H Chen
US Patent 10,203,907, 2019
12019
Set-based bugs discovery system via SQL query
P Chen, K Chen, J Tao, MJ Dutch, M Chamness, B Chen
US Patent 10,146,605, 2018
2018
Feedback control can make data structure layout randomization more cost-effective under zero-day attacks
P Chen, Z Hu, J Xu, M Zhu, P Liu
Cybersecurity 1, 1-13, 2018
62018
System for discovering bugs using interval algebra query language
K Chen, J Tao, P Chen, MJ Dutch, M Chamness, WD Andruss, B Chen, ...
US Patent 10,061,681, 2018
2018
ROPNN: Detection of ROP payloads using deep neural networks
X Li, Z Hu, Y Fu, P Chen, M Zhu, P Liu
arXiv preprint arXiv:1807.11110, 2018
112018
What you see is not what you get! thwarting just-in-time rop with chameleon
P Chen, J Xu, Z Hu, X Xing, M Zhu, B Mao, P Liu
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
92017
Dancing with wolves: Towards practical event-driven vmm monitoring
L Deng, P Liu, J Xu, P Chen, Q Zeng
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on …, 2017
262017
Postmortem program analysis with {Hardware-Enhanced}{Post-Crash} artifacts
J Xu, D Mu, X Xing, P Liu, P Chen, B Mao
26th USENIX Security Symposium (USENIX Security 17), 17-32, 2017
562017
Towards a science for adaptive defense: Revisit server protection
Z Hu, P Chen, Y Lu, M Zhu, P Liu
2016 IEEE 2nd International Conference on Collaboration and Internet …, 2016
12016
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump
J Xu, D Mu, P Chen, X Xing, P Wang, P Liu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
542016
Demo: A Symbolic N-Variant System
PL Jun Xu, Pinyao Guo, Bo Chen, Robert F Erbacher, Ping Chen
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 65-68, 2016
2016
Hypervisor utilization to reduce bootstrap time for data storage system
XC Ziye Yang, Xiaohong Qin, Lintao Wan, Ping Chen
US Patent 9,354,896, 2016
8*2016
Method to input content in a structured manner with real-time assistance and validation
K Chen, P Chen, MJ Dutch, B Chen, CH Claudatos, F Shao
US Patent 9,317,189, 2016
42016
Set-based bugs discovery system via SQL query
P Chen, K Chen, J Tao, MJ Dutch, M Chamness, B Chen
US Patent 9,274,872, 2016
2016
System for discovering bugs using interval algebra query language
K Chen, J Tao, P Chen, MJ Dutch, M Chamness, WD Andruss, B Chen, ...
US Patent 9,092,563, 2015
12015
The system can't perform the operation now. Try again later.
Articles 1–20